Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Accelerate Intelligence with Automated & Unified Data Security

When it comes to data security, you want it to be accurate, reliable, thorough, and fast. Ideally, faster today than it was yesterday, and faster tomorrow than it was today, to address increasing data security needs in the same amount of time or less. We’re seeing a growing prevalence of employees using unmanaged devices, handling sensitive organizational structured and unstructured data, and accessing managed and unmanaged apps with those devices and that data.

Planning for a Post-quantum World, Now!

One of the primary concerns occupying future-gazers within the technology industry is the impact that quantum advances will have upon established encryption methods. Quantum computing is advancing at pace, and alongside the enthusiasm for what that will enable is a practical concern for the way quantum processing might render some of today’s security approaches ineffective.

Beyond VPNs: Secure Remote Access for OT & IIoT

Everybody loves a good throwback. Flip phones, vinyl records, and maybe even the dial-up tone for nostalgia’s sake. But if your operational technology (OT) and industrial internet of things (IIoT) environment is still relying on traditional VPNs to connect users, vendors, and machines, that’s one throwback you really don’t want. OT systems have evolved. They’re smarter, more connected, and unfortunately more vulnerable than ever.

Cyber Frontlines: Insights from DSEI Japan 2025

Modern conflict is no longer dominated solely by tanks, ships, and fighter jets. The nature of warfare itself has transformed dramatically. Today, battles are increasingly fought—and won—in cyberspace. Historically, military leaders intimately understood their hardware; pilots knew their planes, naval commanders knew their ships, and tank commanders knew their armoured vehicles.

To Grok or Not To Grok: For 29% of Enterprises...There Is No Question

Grok is a chatbot developed by Elon Musk’s xAI. It was initially released to select individuals in November 2023 and became generally available to all X (formerly Twitter) users in December 2024. With the release of Grok-3 in February, Grok’s popularity rose rapidly. However, that rise was short-lived, and its user base in the enterprise has plateaued. At the same time, many organizations took a defensive stance to block the new app pending their own security and AI governance reviews.

Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise

The shift to cloud, SaaS, and hybrid work is no longer breaking news. What is surprising is how many IT and network teams are still trying to stitch together architectures that weren’t designed for today’s distributed world. Data is everywhere. Users are everywhere. Applications live across SaaS, public cloud, and private data centers. Yet too often, traditional network and security architectures can’t keep up, creating bottlenecks, security gaps, and user frustration.

Glitch-hosted Phishing Uses Telegram & Fake CAPTCHAs to Target Navy Federal Credit Union Customers

From January to April 2025, Netskope Threat Labs tracked a three-fold increase in traffic to phishing pages created on the Glitch platform. These phishing campaigns have affected more than 830 organizations and over 3,000 users since January 2025, primarily targeting Navy Federal Credit Union members and seeking sensitive information.

SSE Leader. Again. Why Netskope Keeps Hitting the Mark.

Today we are thrilled to announce that Netskope has once again been named a Leader in the Gartner Magic Quadrant for Security Service Edge (SSE). This is the fourth year in a row Netskope has been recognized as a Leader, and we have been recognized as a Leader every time since the inaugural 2022 Magic Quadrant for SSE.

Netskope Threat Coverage: Scattered Spider

The adversary group commonly referred to as Scattered Spider is also tracked as UNC3944, Muddled Libra, Octo Tempest, Starfraud, Scatter Swine, 0ktapus, Roasted 0ktapus, and Storm-0875. Active since at least 2022, this financially motivated group has rapidly gained notoriety for its social engineering campaigns and ransomware attacks, which span multiple sectors.

PureHVNC RAT Using Fake High-level Job Offers from Fashion and Beauty Brands

In recent months, the Netskope Threat Labs team has observed several different campaigns delivering the PureHVNC RAT and its plugins. In 2024, the same malware was observed being delivered via a Python chain, and a few days ago, it was also observed using genAI sites to lure victims. In this blog post, we’ll describe an infection chain using different methods to lure the victim and successfully deliver the PureHVNC RAT.